http://www.symantec.com/norton/security_response/writeup.jsp?docid=2010-011102-5409-99
Bloodhound Exploit 289 is generally being exploited via Adobe products.
Unfortunately, because this is a Terminal Server, you will have a multitude of people opening up PDFs, both local and from the web, where this little bugger can be hiding.
Your best option, unfortunately, keep Acrobat and all other Adobe products I.E. Flash, Shockwave, Photoshop, etc. patched to the latest versions.
Acrobat Reader oftens has exploits.
You can keep updating it, every time you have an update/patch release.
Alternatively, you can use another PDF reader and instruct your users to begin using this application, of your choice instead.
We often refer to "Adobe reader" exploits" but does that mean another reader will not be vulnerable? The answer to that is unknown.
One thing for sure, Adobe has the ressources to patch the vulnerabilities more than a smaller open source competitor, but on the other hand, that open source competitor, may not have the exposure, so would be a less likely target for the efforts of trying to exploit it's code.
Open code, however, does offer a great deal of opportunity to be exploited...
http://www.securityfocus.com/bid/36665
Here it indicates that Version 9.2 of Adobe Reader is NOT vulnerable to this exploit.
I would suggest you start there.
After cleaning out the infection of course.